Skip to content
crmnuggets
Menu
  • Home
  • ABOUT
  • CRM
    • SCRUM
    • ITIL 4
  • RCCG SOD
  • DEVOTION
  • PROJECT MANAGEMENT
  • MORE
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME
Menu

Follow Us On Social Media

SEARCH THROUGH OUR BLOG

NAVIGATE HERE

Author: Adeniyi Salau

Adeniyi Salau is a highly dedicated and committed Blogger of repute. He likes sharing his IT knowledge with others. My desire is to impact as many lives as possible with my IT skills. You can download my mobile APP. Download the ICTLOAD APP on Google Playstore. Thanks.
Understanding Authority And PKI Trust System

Authority And PKI Trust System: The Facts

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  Internet traffic consists of traffic between two parties. When establishing an asymmetric connection between two hosts, the hosts will exchange their public key information. An SSL certificate is a digital certificate that confirms the identity of a website domain. To implement SSL on your website, you purchase an SSL certificate for your domain from…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more

Analysing Applications And Its Impact On Cryptography

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  In my previous article, I have talked about all that you need to know about network security. In this article, I will be talking about applications and their impacts on cryptography. Where can PKI be used by an enterprise? The following provides a shortlist of common uses of PKIs: SSL/TLS certificate-based peer authentication Secure…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Understanding Antimalware Protection In Cybersecurity

Antimalware Protection In Cybersecurity: Facts To Note

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  The term “endpoint” is defined in various ways. For the purpose of this course, we can define endpoints as hosts on the network that can access or be accessed by other hosts on the network. This obviously includes computers and servers, however many other devices can also access the network. With the rapid growth…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Facts About Host Based Firewalls In Cybersecurity

Host Based Firewalls In Cybersecurity: The Facts

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  Host-based personal firewalls are standalone software programs that control traffic entering or leaving a computer. Firewall apps are also available for Android phones and tablets. In this article, I want to talk about some of the facts that you need to know about host-based firewalls in cybersecurity. Host-based firewalls may use a set of…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Understanding Network Profiling In Cybersecurity

Network Profiling In Cybersecurity: Facts To Note

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  In order to detect serious security incidents, it is important to understand, characterize, and analyze information about normal network functioning. Networks, servers, and hosts all exhibit typical behaviour for a given point in time. Network and device understanding network profiling in cybersecurity Care must be taken when capturing baseline data so that all normal…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Highlighting Common Vulnerability Scoring System

Common Vulnerability Scoring System: Facts To Note

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  The Common Vulnerability Scoring System (CVSS) is a risk assessment tool that is designed to convey the common attributes and severity of vulnerabilities in computer hardware and software systems. The third revision, CVSS 3.0, is a vendor-neutral, industry-standard, open framework for weighting the risks of a vulnerability using a variety of metrics. These weights…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Understanding Risk Management In Cybersecurity

Risk Management In Cybersecurity: Facts To Note

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

Risk management in cybersecurity involves the selection and specification of security controls for an organization. It is part of an ongoing organization-wide information security program that involves the management of the risk to the organization or to individuals associated with the operation of a system. The image is a diagram of the Risk Management Process….

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more

Information Security Management System: Facts To Note

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

An Information Security Management System (ISMS) consists of a management framework through which an organization identifies, analyzes, and addresses information security risks. ISMSs are not based on servers or security devices. Instead, an ISMS consists of a set of practices that are systematically applied by an organization to ensure continuous improvement in information security. ISMSs…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Protocols

Ways Of Monitoring Syslog And NTP Protocols Effectively

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  Various protocols that commonly appear on networks have features that make them of special interest in security monitoring. For example, Syslog and Network Time Protocol (NTP) are essential to the work of the cybersecurity analyst. In this article, I will be talking about how to use Syslog and NTP protocols effectively.   The Syslog…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Understanding Access Control List In Cybersecurity

Understanding Access Control List In Cybersecurity

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  Many technologies and protocols can have impacts on security monitoring. Access Control Lists (ACLs) are among these technologies. ACLs can give a false sense of security if they are overly relied upon. ACLs, and packet filtering in general, are technologies that contribute to an evolving set of network security protections.   The figure illustrates…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
7 Types Of Security Data In Cybersecurity

7 Types Of Security Data In Cybersecurity

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

Alert data consists of messages generated by intrusion prevention systems (IPSs) or intrusion detection systems (IDSs) in response to traffic that violates a rule or matches the signature of a known exploit. A network IDS (NIDS), such as Snort, comes configured with rules for known exploits. Alerts are generated by Snort and are made readable…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
6 Types Of End Device Logs In Cybersecurity

End Device Logs In Cybersecurity: The Various Types

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

As previously discussed, host-based intrusion detection systems (HIDS) run on individual hosts. HIDS not only detects intrusions but in the form of host-based firewalls, which can also prevent intrusion. This software creates logs and stores them on the host. This can make it difficult to get a view of what is happening on hosts in…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Network Logs In Cybersecurity: Facts To Note

Network Logs In Cybersecurity: Facts To Note

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

The tcpdump command-line tool is a very popular packet analyzer. It can display packet captures in real-time or write packet captures to a file. It captures detailed packet protocol and content data. Wireshark is a GUI built on tcpdump functionality. The structure of tcpdump captures varies depending on the protocol captured and the fields requested….

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more

Use Of Security Onion As A Source Of Alerts

Posted on June 24, 2022October 2, 2023 by Adeniyi Salau

Use Of Security Onion As A Source Of Alerts   Security Onion is an open-source suite of Network Security Monitoring (NSM) tools that run on an Ubuntu Linux distribution. Security Onion tools provide three core functions for the cybersecurity analyst: full packet capture and data types, network-based and host-based intrusion detection systems, and alert analyst…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Cybersecurity

The Need For Alert Evaluation In Cybersecurity

Posted on June 24, 2022October 2, 2023 by Adeniyi Salau

The threat landscape is constantly changing as new vulnerabilities are discovered and new threats evolve. As a user and organizational needs change, so also does the attack surface. Threat actors have learned how to quickly vary the features of their exploits in order to evade detection. This article talks about alert evaluation in cybersecurity. It…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more

Elastic Data Core Components In Cybersecurity

Posted on June 24, 2022October 2, 2023 by Adeniyi Salau

  A typical network has a multitude of different logs to keep track of and most of those logs are in different formats. With huge amounts of disparate data, how is it possible to get an overview of network operations while also getting a sense of subtle anomalies or changes in the network? This article…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Using Sguil In Investigating Network Data

Using Sguil In Investigating Network Data

Posted on June 24, 2022October 2, 2023 by Adeniyi Salau

  The primary duty of a cybersecurity analyst is the verification of security alerts. Depending on the organization, the tools used to do this will vary. For example, a ticketing system may be used to manage task assignments and documentation. In Security Onion, the first place that a cybersecurity analyst will go to verify alerts…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Digital Forensics In Cybersecurity: Facts To Note

Digital Forensics In Cybersecurity: Facts To Note

Posted on June 24, 2022October 2, 2023 by Adeniyi Salau

    Now that you have investigated and identified valid alerts, what do you do with the evidence? The cybersecurity analyst will inevitably uncover evidence of criminal activity. In order to protect the organization and to prevent cybercrime, it is necessary to identify threat actors, report them to the appropriate authorities, and provide evidence to…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Cyber Killer Chain In Cybersecurity: Facts To Know

Cyber Killer Chain In Cybersecurity: Facts To Know

Posted on June 24, 2022October 2, 2023 by Adeniyi Salau

  The Cyber Killer Chain was developed by Lockheed Martin to identify and prevent cyber intrusions. There are seven steps to the Cyber Kill Chain. Focusing on these steps helps analysts understand the techniques, tools, and procedures of threat actors.   When responding to a security incident, the objective is to detect and stop the…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Intrusion Analysis

Understanding Diamond Model Of Intrusion Analysis

Posted on June 24, 2022October 2, 2023 by Adeniyi Salau

  The Diamond Model of Intrusion Analysis is made up of four parts, as shown in the figure. The model represents a security incident or event. In the Diamond Model, an event is a time-bound activity that is restricted to a specific step in which an adversary uses a capability over infrastructure to attack a…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
  • Previous
  • 1
  • …
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • …
  • 90
  • Next

CHECK THIS

© 2025 CRMNUGGETS | Powered by Minimalist Blog WordPress Theme